Management (RMM) clients to gain administrative control, install backdoors, and possibly set the stage for ransomware deployment. The vulnerabilities, identified as CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728, were initially flagged by Arctic Wolf as potential attack vectors last week. While the…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Sophisticated Phishing Campaign Circumvents Microsoft’s Multi Factor Authentication
A help desk phishing campaign uses spiofed login pages to target Microsoft Active Directory Federation Services (ADFS) within an organisation in order to obtain credentials and get around multi-factor authentication (MFA) protections. The campaign’s main targets, as reported by…
The Rising Problem of Banking Scams in East India
Currently, India is battling with a fake banking applications spoofing genuine institutions to loot credentials and money. The scale of the campaign is massive, impacting around 900 different malware samples linked to more than 1000 different contact numbers used to…
WhatsApp Alerts Users About a Dangerous Zero-Click Spyware Attack
WhatsApp has warned users about a highly advanced hacking attack that infected nearly 90 people across 24 countries. Unlike traditional cyberattacks that rely on tricking victims into clicking malicious links, this attack used zero-click spyware, meaning the targets were…
The Future of Data Security Lies in Quantum-Safe Encryption
Cybersecurity experts and analysts have expressed growing concerns over the potential threat posed by quantum computing to modern cryptographic systems. Unlike conventional computers that rely on electronic circuits, quantum computers leverage the principles of quantum mechanics, which could enable…
DeepSeek-R1 AI Under Fire for Severe Security Risks
DeepSeek-R1, an AI model developed in China, is facing intense scrutiny following a study by cybersecurity firm Enkrypt AI, which found it to be 11 times more vulnerable to cybercriminal exploitation compared to other AI models. The research highlights…
Privacy Concerns Rise Over Antivirus Data Collection
To maintain the security of their devices from cyberattacks, users rely critically on their operating systems and trusted anti-virus programs, which are among the most widely used internet security solutions. Well-established operating systems and reputable cybersecurity software need to…
19 US States Sue to Prevent DOGE From Accessing Americans’ Private Data
In an effort to prevent Elon Musk’s Department of Government Efficiency from gaining access to Treasury Department documents that hold private information like Social Security numbers and bank account numbers for millions of Americans, 19 Democratic attorneys general filed…
North Yorkshire Hospital Adopts AI for Faster Lung Cancer Detection
A hospital in North Yorkshire has introduced artificial intelligence (AI) technology to improve the detection of lung cancer and other serious illnesses. Harrogate and District NHS Foundation Trust announced that the AI-powered system would enhance the efficiency and accuracy…
Chinese Hackers Exploit SSH Daemon to Maintain Persistent Access in Cyber-Espionage Operations
A sophisticated cyber-espionage campaign attributed to the Chinese hacking group Evasive Panda, also known as DaggerFly, has been uncovered, targeting network appliances through a newly identified attack suite. According to cybersecurity researchers at Fortinet’s FortiGuard Labs, the attackers are…
Hackers Steal Login Details via Fake Microsoft ADFS login pages
A help desk phishing campaign attacked a company’s Microsoft Active Directory Federation Services (ADFS) via fake login pages and stole credentials by escaping multi-factor authentication (MFA) safety. The campaign attacked healthcare, government, and education organizations, targeting around 150 victims, according…
India Expands Aadhaar Authentication, Allowing Private Sector Access to Biometric Data
The Indian government has introduced significant changes to its Aadhaar authentication system, expanding its use to a wider range of industries. Previously restricted to sectors like banking, telecommunications, and public utilities, Aadhaar verification will now be available to businesses…
Fake Wedding Invitation Malware Targets Android Users
Malicious actors are propagating a recently discovered Android malware called Tria by sending phoney wedding invitations to consumers in Brunei and Malaysia. According to a report published by the Russian cybersecurity firm Kaspersky, the attackers have been using private…
Grubhub Data Breach Exposes Customer and Driver Information
Food delivery service Grubhub has suffered a security breach that exposed sensitive information belonging to customers, drivers, and merchants. The breach, caused by unauthorized access through a third-party service provider, compromised personal details, hashed passwords, and partial credit card…
Kimsuky Hackers Deploy forceCopy Malware in Spear-Phishing Attacks
North Korea-linked hacking group Kimsuky has been identified conducting targeted spear-phishing campaigns to distribute an information stealer known as forceCopy, according to the latest findings from the AhnLab Security Intelligence Center (ASEC). The cyberattacks begin with phishing emails that…
Hackers Use Forked Stealer to Breach Russian Businesses
As of January 2025, there were multiple attacks on Russian organizations across several industries, including finance, retail, information technology, government, transportation, and logistics, all of which have been targeted by BI.ZONE. The threat actors have used NOVA stealer, a…
Mastercard to Eliminate 16-Digit Card Numbers by 2030 for Enhanced Security
In a strategic move to combat identity theft and fraud, Mastercard has announced plans to remove the traditional 16-digit card number from credit and debit cards by 2030. Instead, the company will implement tokenization and biometric authentication to enhance…
Dangers of AI Phishing Scam and How to Spot Them
Supercharged AI phishing campaigns are extremely challenging to notice. Attackers use AI phishing scams with better grammar, structure, and spelling, to appear legit and trick the user. In this blog, we learn how to spot AI scams and avoid becoming…
Ethical Hacker Finds Security Flaw in Subaru Starlink, Gains Remote Access to Vehicles
A cybersecurity researcher recently discovered a serious vulnerability in Subaru’s Starlink system, allowing him to remotely control vehicles across the U.S., Canada, and Japan. The ethical hacker, Sam Curry, was able to unlock doors, start and stop engines, and…
RSA Encryption Breached by Quantum Computing Advancement
A large proportion of the modern digital world involves everyday transactions taking place on the internet, from simple purchases to the exchange of highly sensitive corporate data that is highly confidential. In this era of rapid technological advancement, quantum…